| Literature DB >> 31431005 |
Algimantas Venčkauskas1, Nerijus Morkevicius2, Vaidas Jukavičius2, Robertas Damaševičius2, Jevgenijus Toldinas2, Šarūnas Grigaliūnas2.
Abstract
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called "constrained devices" arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens of devices primarily communicating with each other (e.g., various sensors in Body Area Network communicating with each other). These devices have very limited memory, processing, and power resources, so traditional security protocols and architectures also do not fit well. To address these challenges the Fog computing paradigm is used in which all constrained devices, or Edge nodes, primarily communicate only with less-constrained Fog node device, which collects all data, processes it and communicates with the outside world. We present a new lightweight secure self-authenticable transfer protocol (SSATP) for communications between Edge nodes and Fog nodes. The primary target of the proposed protocol is to use it as a secure transport for CoAP (Constrained Application Protocol) in place of UDP (User Datagram Protocol) and DTLS (Datagram Transport Layer Security), which are traditional choices in this scenario. SSATP uses modified header fields of standard UDP packets to transfer additional protocol handling and data flow management information as well as user data authentication information. The optional redundant data may be used to provide increased resistance to data losses when protocol is used in unreliable networks. The results of experiments presented in this paper show that SSATP is a better choice than UDP with DTLS in the cases, where the CoAP block transfer mode is used and/or in lossy networks.Entities:
Keywords: CoAP; communication protocol; fog computing; information security; lightweight security protocols; wireless actuators; wireless sensors
Year: 2019 PMID: 31431005 PMCID: PMC6721158 DOI: 10.3390/s19163612
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Three-layer Fog computing-based eHealth architecture.
Figure 2Datagram Transport Layer Security (DTLS)-secured Constrained Application Protocol (CoAP) architecture.
Figure 3Proposed modifications to the User Datagram Protocol (UDP) packet’s header. Standard UDP header (a) and modified header (b).
Figure 4Energy consumption measurement setup: (a) Overall picture of the setup, (b) principal diagram of the setup, here EDM—Edge device module, EMM—energy measuring module [50].
Figure 5Power consumption of the Wi-Fi network card while transferring 1 MB of data using 2048 B data packets and different transport protocols.
Figure 6Comparison of time needed to transfer 1 MB of data using different transport protocols.
Data transfer mode used in various cases of transport protocol and user data sizes.
| User Data Size, B | UDP, DTLS | M64 | M128 | |||
|---|---|---|---|---|---|---|
| Transfer Mode | Max. Packet Length on Media, B | Transfer Mode | Max. Packet Length on Media, B | Transfer Mode | Max. Packet Length on Media, B | |
| ≤1024 | Plain packet | 1024 | Plain 3 packets | 512 | Plain 5 packets | 256 |
| 1025–2048 | Block-Wise transfer | 512 | Plain 3 packets | 1024 | Plain 5 packets | 512 |
| 2049–4096 | Block-Wise transfer | 512 | Block-Wise transfer | 512 | Plain 5 packets | 1024 |
| >4096 | Block-Wise transfer | 512 | Block-Wise transfer | 512 | Block-Wise transfer | 512 |
Figure 7Comparison of user data losses using different transport protocols in lossy network.
Figure 8Comparison of energy consumption.